We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Selective Forwarding based Intrusion Detection System for Secure Wireless Sensor Network

by Bharti Bains, Rohit Vaid
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 77 - Number 13
Year of Publication: 2013
Authors: Bharti Bains, Rohit Vaid
10.5120/13544-1328

Bharti Bains, Rohit Vaid . Selective Forwarding based Intrusion Detection System for Secure Wireless Sensor Network. International Journal of Computer Applications. 77, 13 ( September 2013), 20-26. DOI=10.5120/13544-1328

@article{ 10.5120/13544-1328,
author = { Bharti Bains, Rohit Vaid },
title = { Selective Forwarding based Intrusion Detection System for Secure Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 77 },
number = { 13 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 20-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume77/number13/13544-1328/ },
doi = { 10.5120/13544-1328 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:50:10.316170+05:30
%A Bharti Bains
%A Rohit Vaid
%T Selective Forwarding based Intrusion Detection System for Secure Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 77
%N 13
%P 20-26
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is the major threat in wireless sensor network. Deployment of sensor nodes in hostile environment makes vulnerable to a variety of potential attacks like Hello flood attack, wormhole attack, black hole attack and selective forward attack. In a black hole attack, compromised node drops all the packets forwarding through it. A special case of black hole attack is selective forwarding attack, where compromised node drops packets selectively, which may deteriorate the network efficiency. Selective forwarding attack is hard to detect, since packet drops in sensor networks may be caused by unreliable wireless communications or node failures. The proposed work is based on centralized intrusion detection scheme which uses multi level dynamic tree routing. It can detect both black hole attack and selective forwarding attack. The proposed scheme is compared with existing scheme and found that the packet delivery ratio in the proposed scheme is much more than the existing scheme.

References
  1. Padmavathi, Dr G. and Mrs Shanmugapriya, "A survey of attacks, security mechanisms and challenges in wireless sensor networks", arXiv preprint arXiv:0909. 0576 (2009).
  2. Kalita, Hemanta Kumar and Avijit Kar, "Wireless sensor network security analysis", International Journal of Next-Generation Networks (IJNGN) 1. 1 (2009): 1-10.
  3. Bysani, Leela Krishna and Ashok Kumar Turuk, "A survey on selective forwarding attack in wireless sensor networks", Devices and Communications (ICDeCom), 2011 International Conference on. IEEE, 2011.
  4. Karlof, Chris and David Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures", Ad hoc networks 1. 2 (2003): 293-315.
  5. Xiao, Bin, Bo Yu and Chuanshan Gao "CHEMAS: Identify suspect nodes in selective forwarding attacks", Journal of Parallel and Distributed Computing 67. 11 (2007): 1218-1230.
  6. Kaplantzis, Sophia, et al. "Detecting selective forwarding attacks in wireless sensor networks using support vector machines", Intelligent Sensors, Sensor Networks and Information, 2007. ISSNIP 2007. 3rd International Conference on. IEEE, 2007.
  7. Brown, Jeremy and Xiaojiang Du. "Detection of selective forwarding attacks in heterogeneous sensor networks", Communications, 2008. ICC'08. IEEE International Conference on. IEEE, 2008.
  8. Deng, Huijuan, et al. "Selective forwarding attack detection using watermark in WSNs", Computing, Communication, Control, and Management, 2009. CCCM 2009. ISECS International Colloquium on. Vol. 3. IEEE, 2009.
  9. Xin-Sheng, Wang, et al. "Lightweight defense scheme against selective forwarding attacks in wireless sensor networks", Cyber-Enabled Distributed Computing and Knowledge Discovery, 2009. CyberC'09. International Conference on. IEEE, 2009.
  10. Li, Guorui, Xiangdong Liu and Cuirong Wang. "A sequential mesh test based selective forwarding attack detection scheme in wireless sensor networks", Networking, Sensing and Control (ICNSC), 2010 International Conference on. IEEE, 2010.
  11. Anthony Wood and John A. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, 35(10):54-62, October 2002.
  12. W z khan, "comprehensive study on selective forward attack".
Index Terms

Computer Science
Information Sciences

Keywords

WSNs Security Selective Forwarding Attack.